Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5125327C.2060703@redhat.com>
Date: Wed, 20 Feb 2013 13:30:52 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: Tim <tim-security@...tinelchicken.org>
CC: oss-security@...ts.openwall.com
Subject: Re: RE: Handling CVEs for the XML entity expansion
 issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/20/2013 01:06 PM, Tim wrote:
> 
>> Docbook uses it quite a bit, e.g. each chapter is a file, then
>> you use external entities to put them all together, also for
>> graphics/etc. Breaking Docbook would make me a sad panda.
> 
> Well sure, some minority of apps will break.  Libraries release
> notes merely need to say "next version breaks backward
> compatibility for apps that use entities and inline DTDs.  If your
> app uses these, explicitly enable with ..."  Once again, "off by
> default", not removed.

Yeah I'm pretty sure that's a less than ideal solution. Less ideal in
the sense of "breaking a whole bunch of customer software without much
warning, some of which is probably closed source and can't be modified
so that it works with these new "improved" xml libraries" is not the
way to go. So that's not gonna happen for most major Linux vendors (in
other words we'll have to find better ways to fix this).

Like Linus says, we can't just start breaking things. That's not how
you fix things.

>> I tend to agree, however for the billion laughs/linear attack
>> that can be somewhat addressed, libxml for example addressed it
>> by stopping all non linear expansion a few years ago, so while
>> still vulnerable they are less vulnerable.
> 
> Yes, but this is by far the least interesting attack scenario for
> most XML libraries.  Since libxml2 is pretty limited in it's
> entities support and network capabilities to begin with, it isn't
> as interesting of a case for XXE generally.  However, other
> libraries leverage many platform network capabilities that make for
> some much more interesting attacks.
> 
> tim
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=Nl21
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.